Maps of the digital lands

hand draw a diagram for one of the following scenarioss:

Drawing Contest Scenarios:

1 Computer Design Diagram

2 Stock Broker Firm

3 Web Design Studio Firm

4 Bank

5 Hospital

6 Retail

7 News Network

8 Freestyle

Scan for scenarios


Summaries

Scenario 1 Computer Design

As a contestant in this intriguing contest, your challenge is to delve into the fascinating world of classic computing and provide a clear, concise, and visually striking diagram of how these marvels of technology are wired together.

Scenario 1 Details

  1. Components: Your diagram must include all primary components of the selected classic computer system. These components should, at a minimum, include the following:
    • Central Processing Unit (CPU)
    • Memory (RAM and ROM)
    • Storage Devices (Floppy Disk Drives, Hard Disk Drives, or Tape Drives)
    • Input/Output Devices (Keyboard, Mouse, Printer, Monitor)
    • Power Supply Unit (PSU)
    • Expansion Slots/Buses
    • Motherboard/Backplane
  2. Connection: Your diagram should clearly illustrate how these components connect and communicate with each other. Make sure to indicate buses, connectors, and any proprietary interfaces involved.
  3. Classic Computer: To make the task more interesting and rewarding, you'll receive extra points if you select a classic computer for this exercise. Potential options include the Amiga, the Z80-based systems, or the Altair 8800, but feel free to choose any other system that fascinates you.Remember, the more historically significant or obscure the computer, the more unique your diagram will be. For instance, you could choose to depict the Commodore 64, Apple II, or IBM PC, all of which played crucial roles in personal computing history. Alternatively, you could opt for something more obscure, like the Soviet Elektronika BK, for a real challenge.
  4. Annotations: For clarity, include brief annotations for each component and connection, explaining their functions and why they were significant or innovative at the time. This not only helps judges understand your diagram but also illustrates your depth of understanding.
  5. Presentation: Remember, presentation matters. Your diagram should be as visually appealing as it is informative. Use color coding, labels, and symbols effectively to make your diagram easy to understand at a glance.
  6. Bonus Points: Demonstrate real-world usage of the computer system. For example, illustrate how a user would load and run a software program, or how data is transferred from storage to memory and then processed by the CPU.

Scenario 2 Gainzeses Stock Broker

Scenario 2 Details

In this scenario, you are tasked with visualizing the network setup of two separate offices of a stock brokerage firm. These offices are in different geographical locations and are connected via the internet provided by two different Internet Service Providers (ISPs). Both offices need to maintain a high level of data integrity and security due to the sensitive nature of the financial transactions and data they handle daily. Therefore, they should employ robust security measures like firewalls and a Site-to-Site VPN connection for safe inter-office communication. Here are the specific requirements:

  1. Office Layouts: The network diagram should show two offices, each comprising multiple workstations.
  2. ISPs: Each office has its own ISP for connectivity. Draw connections from each office to their respective ISP and then show an interconnection between the ISPs to demonstrate inter-office connectivity.
  3. Firewall: To ensure secure inbound and outbound network traffic, depict firewalls for both offices. These should be located between the office networks and the ISPs.
  4. Site-to-Site VPN: To secure inter-office communications, depict a site-to-site VPN connection established between the two office firewalls. This connection should be separate from the direct link between the ISPs.
  5. Endpoints: Illustrate five endpoints (workstations) in each office. These are the devices used by the employees for their daily work and to access the company's resources.
  6. Printers: Show at least one network printer in each office that all endpoints in the same office can access.
  7. Domain Controller: Each office should have its own Domain Controller for handling security authentication requests within a Windows domain. Locate these logically in the diagram.
  8. File Share: Indicate a central file sharing server in each office, accessible by all endpoints in the same office.
  9. SAAS: The offices utilize a Software as a Service (SAAS) platform, either Office 365 for general office productivity or a specialized trading service platform. The endpoints should be able to access this service via the internet connection provided by the ISPs.

Scenario 3 1337 Web Design Studio

Scenario 3 Details

As an architect of the infrastructure of a bustling web design studio, you're responsible for creating an efficient and secure network that supports multiple operations. Your design needs to facilitate secure data flow, efficient storage and retrieval, and provide a reliable system for telepresence developers and marketing team.

  1. Office Space: The office space is the central nervous system of your design studio. It is protected by a robust firewall, which serves as the first line of defense against potential threats. The firewall should be designed to control inbound and outbound traffic, with rules designed according to the principle of least privilege.
  2. Identity Services: You are tasked with designing an efficient domain controller system that provides identity services. This domain controller system must be configured to manage user credentials and privileges to ensure that only authorized individuals can access the network.
  3. Datacenter: Your studio is equipped with a state-of-the-art datacenter, with a scalable web stack hosted either in a colocation facility or on Amazon Web Services (AWS). The datacenter's design needs to showcase:
      Segmentation: The datacenter should be segmented to isolate different system components. Each segment should include a specific purpose or role and must be separated by security measures to limit potential security breaches.
    • Database Cluster: The design must include a robust database cluster to handle massive amounts of data efficiently.
    • Web Server Cluster: To ensure high availability and scalability, your design must include a web server cluster to serve the studio's websites.
    • Load Balancers: You should incorporate load balancers in your design to distribute network traffic evenly across the web server cluster, ensuring quick response times and avoiding server overloads.
    • Monitoring and Analytics Cluster: A section for monitoring and analytics is required to keep an eye on system performance and to gain insights for future improvements. Telepresence Developers: The design must accommodate telepresence developers.
  4. Telepresence Developers: The design must accommodate telepresence developers. They require a network setup that allows them to securely and efficiently collaborate and access resources remotely.
  5. Marketing Team: The marketing team has its specific requirements:
    • • Printers: The network diagram must include local and networked printers that are accessible only to authorized personnel.
    • • File Share: A secure and efficient file sharing system is required to enable team members to share and collaborate on documents and other files.
    • • SFTP Server in a DMZ: To ensure secure file transfers from external sources, a Secure File Transfer Protocol (SFTP) server should be placed in a Demilitarized Zone (DMZ). This area should be isolated from the main network for additional security.
    • • Digital Billboard: A digital billboard, controlled and updated via the network, is used to display marketing materials. The network must support this without compromising overall network security.
  6. Another Domain Controller: To add redundancy and ensure high availability of the identity services, another domain controller is needed. This will also load balance the authentication requests.

Scenario 4 Defcon International Bank

Scenario 4 Details

You are to illustrate a complex yet comprehensive network structure for a fictional banking corporation, "FinTech Global Bank" (FGB), encompassing a central office, two branch offices, and two data centers (primary and disaster recovery).

  1. Central Office:
    • Domain Controllers: Two redundant domain controllers, DC1 and DC2, are responsible for user authentication, group policy, DNS, and DHCP services.
    • Firewall with VPN: A sophisticated firewall system, integrated with a Virtual Private Network (VPN), ensures secure remote access. The firewall also helps prevent unauthorized access while monitoring and recording network traffic.
    • Redundant Network Connections: Two separate ISP connections provide redundancy to maintain network connectivity in case one ISP fails.
    • Loss Prevention: Loss Prevention software (LPS) is installed to help protect sensitive customer data and prevent data leaks.
    • Video Surveillance and Access Control Systems: A series of high-definition surveillance cameras are placed strategically throughout the office premises, all networked into a central monitoring station. The office also uses biometric access control systems for added security.
  2. Bank Branches x2:
    • MPLS Network Connection: Each branch office connects to the central office through a secure MPLS (Multiprotocol Label Switching) network connection.
    • Branch WAN Routers: Branch WAN routers manage traffic between the branch office and the central office.
    • Core/Distribution Switch Stack: A stack of core and distribution switches helps manage network traffic within each branch.
    • Surveillance System: Similar to the central office, each branch office is equipped with a video surveillance system and IP-based alarm system.
    • Printers and Server Endpoints: Multiple printer devices and server endpoints are connected to the network for everyday business operations.
  3. Data Centers x2 (Primary/DR):
    • Firewall and VPN connections: Similar to the central office, both data centers are equipped with firewalls and VPN connections for added security.
    • Databases: Each data center hosts a set of synchronized databases for handling customer data, transactions, and analytics.
    • AS400: Both data centers employ IBM AS/400 systems for application hosting, payroll processing, core banking functions, etc.
    • Microservice Architecture: A microservice architecture is implemented in both data centers to provide scalability and improve service availability.
    • External API EDI: A secure, segregated segment of the network hosts an API server. This server provides access to an external Electronic Data Interchange (EDI) system, allowing FGB to exchange transaction information with other banks and financial institutions.

Scenario 5 St Gods Memorial Hospital

Scenario Details:

Illustrate a dynamic and robust network architecture for a healthcare system, "St GODs Memorial Hospital", that consists of a central administrative office, a primary data center, multiple hospital facilities, numerous outpatient clinics, and a central medical equipment distribution center.

  1. Central Administrative Office:
  2. Data Center:
  3. Hospitals (Multiple Units):
  4. Outpatient Clinics (Multiple Units):
  5. Distribution Center:

Scenario 6 HackToolz Retail

Scenario 6 Details

Illustrate an integrated and resilient network design for the fictional retail brand "HackToolz". This retail chain is focused on providing hacking hardware and software tools, necessitating a unique blend of e-commerce, brick-and-mortar operations, and PCI compliance for its payment systems.

  1. Central Administrative Office:
  2. Retail Stores (3 Units):
  3. Warehouse & Distribution Center:
  4. Data Center:

Scenario 7 Defcon News Network (DNN)

Scenario 7 Details

Craft an intricate and efficient network diagram for "DEFCON News Networks (DNN)", an innovative and rapidly growing media organization that spans across the globe, delivering top-notch, real-time news content.

  1. Main Office:
  2. Storage System:
  3. Satellite Network:
  4. Remote Reporters: